Jemal H. Abawajy

According to our database1, Jemal H. Abawajy authored at least 238 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Intelligent, smart and scalable cyber-physical systems.
Journal of Intelligent and Fuzzy Systems, 2019

Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Fuzzy logic approach to repair coverage holes in internet of things monitoring applications.
IET Wireless Sensor Systems, 2019

2018
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce.
IEEE Trans. Services Computing, 2018

A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018

Learning automaton based topology control protocol for extending wireless sensor networks lifetime.
J. Network and Computer Applications, 2018

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.
Future Generation Comp. Syst., 2018

Universal and secure object ownership transfer protocol for the Internet of Things.
Future Generation Comp. Syst., 2018

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection.
Future Generation Comp. Syst., 2018

Identifying cyber threats to mobile-IoT applications in edge computing paradigm.
Future Generation Comp. Syst., 2018

Minimal ensemble based on subset selection using ECG to diagnose categories of CAN.
Computer Methods and Programs in Biomedicine, 2018

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center.
IEEE Access, 2018

Malware Threats and Detection for Industrial Mobile-IoT Networks.
IEEE Access, 2018

A Framework for Software Defect Prediction and Metric Selection.
IEEE Access, 2018

Breast Cancer Recurrence Prediction Using Random Forest Model.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems.
IEEE Trans. Evolutionary Computation, 2017

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

Virtual networks dependability assessment framework.
IJHPCN, 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Generation Comp. Syst., 2017

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.
Concurrency and Computation: Practice and Experience, 2017

Multilayer hybrid strategy for phishing email zero-day filtering.
Concurrency and Computation: Practice and Experience, 2017

Applications and techniques in information and network security.
Concurrency and Computation: Practice and Experience, 2017

Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System.
IEEE Communications Magazine, 2017

Cloud-assisted IoT-based health status monitoring framework.
Cluster Computing, 2017

A parallel framework for software defect detection and metric selection on cloud computing.
Cluster Computing, 2017

Advances in Teaching and Learning on Facebook in Higher Institutions.
IEEE Access, 2017

Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study.
IEEE Access, 2017

Securing Websites Against Homograph Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2017

Privacy Threat Analysis of Mobile Social Network Data Publishing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Clustering analysis for malicious network traffic.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles.
IEEE J. Biomedical and Health Informatics, 2016

Filtering Redundant Data from RFID Data Streams.
J. Sensors, 2016

Evolutionary optimization: A big data perspective.
J. Network and Computer Applications, 2016

Network computing and applications for Big Data analytics.
J. Network and Computer Applications, 2016

Secure Object Tracking Protocol for the Internet of Things.
IEEE Internet of Things Journal, 2016

Sensor-Web Systems, Applications, and Services.
IJDSN, 2016

Privacy models for big data: a survey.
IJBDI, 2016

Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Generation Comp. Syst., 2016

Trust, Security and Privacy in Emerging Distributed Systems.
Future Generation Comp. Syst., 2016

Vertex re-identification attack using neighbourhood-pair properties.
Concurrency and Computation: Practice and Experience, 2016

Privacy Preserving Social Network Data Publication.
IEEE Communications Surveys and Tutorials, 2016

An alternative data collection scheduling scheme in wireless sensor networks.
Computing, 2016

Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II.
Proceedings of the 24th International Conference on Software, 2016

A Multi-protocol Security Framework to Support Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2016

Text Detection in Low Resolution Scene Images Using Convolutional Neural Network.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

A Framework to Analyze Quality of Service (QoS) for Text-To-Speech (TTS) Services.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

Failure detection in virtual network environment.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

An alternative sensor Cloud architecture for vital signs monitoring.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

ECG rate control scheme in pervasive health care monitoring system.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Prediction of Virtual Networks Substrata Failures.
Proceedings of the Advances in Services Computing, 2016

2015
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions.
Wireless Communications and Mobile Computing, 2015

Service level agreement management framework for utility-oriented computing platforms.
The Journal of Supercomputing, 2015

A Data Fusion Method in Wireless Sensor Networks.
Sensors, 2015

An efficient and distributed file search in unstructured peer-to-peer networks.
Peer-to-Peer Networking and Applications, 2015

Comprehensive analysis of big data variety landscape.
IJPEDS, 2015

Multimedia content adaptation service discovery mechanism.
Multimedia Tools Appl., 2015

Dynamic path determination policy for distributed multimedia content adaptation.
Multimedia Tools Appl., 2015

Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications.
Mathematics in Computer Science, 2015

Utility-aware social network graph anonymization.
J. Network and Computer Applications, 2015

An efficient meta-heuristic algorithm for grid computing.
J. Comb. Optim., 2015

Mitigating malicious feedback attacks in trust management systems.
IJTMCC, 2015

Ideal basis in constructions defined by directed graphs.
EJGTA, 2015

Policy-based SQLIA detection and prevention approach for RFID systems.
Computer Standards & Interfaces, 2015

Secure object tracking protocol for Networked RFID Systems.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems.
Proceedings of the Security and Privacy in Communication Networks, 2015

Reliability-Aware Distributed Computing Scheduling Policy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for TCP/IP Mobile Cloud.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Layered workflow scheduling algorithm.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

A Survey of Big Workflow.
Proceedings of the Second International Conference on Advanced Data and Information Engineering, 2015

A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture.
The Journal of Supercomputing, 2014

The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms.
IEEE Trans. Fuzzy Systems, 2014

Large Iterative Multitier Ensemble Classifiers for Security of Big Data.
IEEE Trans. Emerging Topics Comput., 2014

Data Replication Approach with Consistency Guarantee for Data Grid.
IEEE Trans. Computers, 2014

Guest Editorial.
JNW, 2014

Securing a Smart Anti-counterfeit Web Application.
JNW, 2014

A Hybrid Wrapper-Filter Approach for Malware Detection.
JNW, 2014

Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking.
JNW, 2014

Guest Editorial.
JNW, 2014

Iterative Construction of Hierarchical Classifiers for Phishing Website Detection.
JNW, 2014

Using response action with intelligent intrusion detection and prevention system against web application malware.
Inf. Manag. Comput. Security, 2014

Emerging Sensor-Cloud Technology for Pervasive Services and Applications.
IJDSN, 2014

Sensor Grid Middleware Metamodeling and Analysis.
IJDSN, 2014

An approach for profiling phishing activities.
Computers & Security, 2014

Scalable RFID security framework and protocol supporting Internet of Things.
Computer Networks, 2014

User preference of cyber security awareness delivery methods.
Behaviour & IT, 2014

An Improved Gbest Guided Artificial Bee Colony (IGGABC) Algorithm for Classification and Prediction Tasks.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

An Accelerated Particle Swarm Optimization Based Levenberg Marquardt Back Propagation Algorithm.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm Optimization Algorithm.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Taxonomy of Contention Management in Interconnected Distributed Systems.
Proceedings of the Computing Handbook, 2014

2013
IPMA: Indirect Patterns Mining Algorithm.
Proceedings of the Advanced Methods for Computational Collective Intelligence, 2013

Malware Detection and Prevention in RFID Systems.
Proceedings of the Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, 2013

SQLIA detection and prevention approach for RFID systems.
Journal of Systems and Software, 2013

A multi-tier phishing detection and filtering approach.
J. Network and Computer Applications, 2013

Fuzzy logic optimized wireless sensor network routing protocol.
J. High Speed Networks, 2013

Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes.
IJDWM, 2013

An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net.
JCSE, 2013

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag.
IJNDC, 2013

Malware Detection and Prevention System Based on Multi-Stage Rules.
IJISP, 2013

GLOA: A New Job Scheduling Algorithm for Grid Computing.
IJIMAI, 2013

Power graphs: A survey.
EJGTA, 2013

A framework for scalable distributed provenance storage system.
Computer Standards & Interfaces, 2013

Multistage approach for clustering and classification of ECG data.
Computer Methods and Programs in Biomedicine, 2013

Predicting cardiac autonomic neuropathy category for diabetic data with missing values.
Comp. in Bio. and Med., 2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy.
Artificial Intelligence in Medicine, 2013

Preserving Utility in Social Network Graph Anonymization.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Profiling Phishing Email Based on Clustering Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Crime Toolkits: The Productisation of Cybercrime.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Security Concerns and Remedy in a Cloud Based E-learning System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Securing a Web-Based Anti-counterfeit RFID System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Neighbourhood-Pair Attack in Social Network Data Publishing.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

A new energy efficient cluster-head and backup selection scheme in WSN.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

A fuzzy technique to control congestion in WSN.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

2012
An efficient approach based on trust and reputation for secured selection of grid resources.
IJPEDS, 2012

Failure-aware resource provisioning for hybrid Cloud infrastructure.
J. Parallel Distrib. Comput., 2012

Guest Editorial.
JNW, 2012

Guest Editorial.
JNW, 2012

Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing.
Future Generation Comp. Syst., 2012

Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detecting and Mitigating HX-DoS Attacks against Cloud Web Services.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Using feature selection for intrusion detection system.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Hybrid Cloud resource provisioning policy in the presence of resource failures.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level Ensemble Classi ers and Feature Selection Based.
Proceedings of the Tenth Australasian Data Mining Conference, AusDM 2012, Sydney, 2012

2011
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors.
Sensors, 2011

An Approach for Removing Redundant Data from RFID Data Streams.
Sensors, 2011

Guest Editorial.
JNW, 2011

QoS-based adaptation service selection broker.
Future Generation Comp. Syst., 2011

Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Phishing Email Feature Selection Approach.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Mutual Authentication Protocol for Networked RFID Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Establishing Trust in Hybrid Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Efficient Resource Selection Algorithm for Enterprise Grid Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Privacy Threat Analysis of Social Network Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Hybrid Feature Selection for Phishing Email Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

A Protocol for Discovering Content Adaptation Services.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Securing RFID Systems from SQLIA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Service Quality Assessment in Provision of Library Services.
Proceedings of the U- and E-Service, Science and Technology, 2011

Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

Engaging and Effective Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

2010
Agents Based e-Commerce and Securing Exchanged Information.
Proceedings of the Pervasive Computing, 2010

Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models.
Sensors, 2010

Network Management in Distributed Systems.
Scalable Computing: Practice and Experience, 2010

A rough set approach for selecting clustering attribute.
Knowl.-Based Syst., 2010

Negotiation Strategy for Mobile Agent-Based e-Negotiation.
Proceedings of the Principles and Practice of Multi-Agent Systems, 2010

Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Service Discovery for Service-Oriented Content Adaptation.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Hybrid Mutual Authentication Protocol for RFID.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Matrices Representation of Multi Soft-Sets and Its Application.
Proceedings of the Computational Science and Its Applications, 2010

Novel Mechanism for Evaluating Feedback in the Grid Environment on Resource Allocation.
Proceedings of the 2010 International Conference on Grid Computing & Applications, 2010

An Approach to Filtering Duplicate RFID Data Streams.
Proceedings of the U- and E-Service, Science and Technology, 2010

A Privacy Preserving Service Broker Architecture for Data Sharing.
Proceedings of the Future Generation Information Technology, 2010

Performance Analysis of Cyber Security Awareness Delivery Methods.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Multi-criteria Content Adaptation Service Selection Broker.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

2009
Guest Editorial.
JNW, 2009

Adaptive hierarchical scheduling policy for enterprise grid computing systems.
J. Network and Computer Applications, 2009

Human-computer interaction in ubiquitous computing environments.
Int. J. Pervasive Computing and Communications, 2009

Advances in pervasive computing: GUEST EDITORIAL.
Int. J. Pervasive Computing and Communications, 2009

Managing data using neighbour replication on a triangular-grid structure.
IJHPCN, 2009

An agent architecture for managing data resources in a grid environment.
Future Generation Comp. Syst., 2009

Multi-cluster computing interconnection network performance modeling and analysis.
Future Generation Comp. Syst., 2009

An efficient adaptive scheduling policy for high-performance computing.
Future Generation Comp. Syst., 2009

Design and Delivery of Undergraduate IT Security Management Course.
Proceedings of the Advances in Information Security and Assurance, 2009

Enhancing RFID Tag Resistance against Cloning Attack.
Proceedings of the Third International Conference on Network and System Security, 2009

A Layered Security Approach for Cloud Computing Infrastructure.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

An Approach to Filtering RFID Data Streams.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Information Provenance for Open Distributed Collaborative System.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Determining Service Trustworthiness in Intercloud Computing Environments.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A RFID architecture framework for global supply chain applications.
Proceedings of the iiWAS'2009, 2009

2008
Security and privacy threats to volunteer computing.
IJCIS, 2008

An efficient replicated data access approach for large-scale distributed systems.
Future Generation Comp. Syst., 2008

A comprehensive analytical model of interconnection networks in large-scale cluster systems.
Concurrency and Computation: Practice and Experience, 2008

Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks.
Computers & Electrical Engineering, 2008

A classification for content adaptation system.
Proceedings of the iiWAS'2008, 2008

An Online Credential Management Service for InterGrid Computing.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Analytical modeling of interconnection networks in heterogeneous multi-cluster systems.
The Journal of Supercomputing, 2007

Analytical communication networks model for enterprise Grid computing.
Future Generation Comp. Syst., 2007

Feedback Credibility Issues In Trust Management Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare Providers.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Sensor Node Activity Scheduling Approach.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Authorization Policy Management Framework for Dynamic Medical Data Sharing.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Communication Network Analysis of the Enterprise Grid Systems.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

Taxonomy and Survey of Location Management Systems.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Multilevel Trust Management Framework.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A performance model for analysis of heterogeneous multi-cluster systems.
Parallel Computing, 2006

A novel data replication and management protocol for mobile computing systems.
Mobile Information Systems, 2006

Adaptive parallel I/O scheduling algorithm for multiprogrammed systems.
Future Generation Comp. Syst., 2006

Special section: Parallel input/output management techniques (PIOMT) in cluster and grid computing.
Future Generation Comp. Syst., 2006

Analysis of Interconnection Networks in Heterogeneous Multi-Cluster Systems.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Analytical Modeling of Communication Latency in Multi-Cluster Systems.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Managing Data Using Neighbor Replication on Triangular-Grid Structure.
Proceedings of the Computational Science, 2006

A Reputation-Based Grid Information Service.
Proceedings of the Computational Science, 2006

Economy-Based Data Replication Broker.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Analytical Network Modeling of Heterogeneous Large-Scale Cluster Systems.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

Supporting Disconnected Operations in Mobile Computing.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Parallel I/O Scheduling in the Presence of Data Duplication on Multiprogrammed Cluster Computing Systems.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Performance Analysis of Heterogeneous Multi-Cluster Systems.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

A New Approach For Efficiently Achieving High Availability in Mobile Computing.
Proceedings of the Computational Science and Its Applications, 2005

Robust Parallel Job Scheduling Infrastructure for Service-Oriented Grid Computing Systems.
Proceedings of the Computational Science and Its Applications, 2005

Performance Analysis of Interconnection Networks for Multi-cluster Systems.
Proceedings of the Computational Science, 2005

High Reliability Replication Technique for Web-Server Cluster Systems.
Proceedings of the Computational Science, 2005

An Efficient Replicated Data Management Approach for Peer-to-Peer Systems.
Proceedings of the Computational Science, 2005

Autonomic Job Scheduling Policy for Grid Computing.
Proceedings of the Computational Science, 2005

Job Scheduling Policy for High Throughput Grid Computing.
Proceedings of the Distributed and Parallel Computing, 2005

Fault-Tolerant Dynamic Job Scheduling Policy.
Proceedings of the Distributed and Parallel Computing, 2005

A new Internet meta-search engine and implementation.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Preemptive Job Scheduling Policy For Distributively-Owned Workstation Clusters.
Parallel Processing Letters, 2004

Fault-tolerant Grid Resource Management Infrastructure.
Neural Parallel & Scientific Comp., 2004

Grid Accounting Service Infrastructure for Service-Oriented Grid Computing Systems.
Proceedings of the Scientific Applications of Grid Computing, First International Workshop, 2004

Grid accounting and payment architecture.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

Fault-Tolerant Scheduling Policy for Grid Computing Systems.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Design and Evaluation of an Agent-Based Communication Model for a Parallel File System.
Proceedings of the Computational Science and Its Applications, 2004

Fault Detection Service Architecture for Grid Computing Systems.
Proceedings of the Computational Science and Its Applications, 2004

File Replacement Algorithm for Storage Resource Managers in Data Grids.
Proceedings of the Computational Science, 2004

Placement of File Replicas in Data Grid Environments.
Proceedings of the Computational Science, 2004

Dynamic Parallel Job Scheduling in Multi-cluster Computing Systems.
Proceedings of the Computational Science, 2004

Cooperation model of a multiagent parallel file system for clusters.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

An efficient replicated data access approach for large-scale distributed systems.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
A Reconfigurable Multi-Layered Grid Scheduling Infrastructure.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Scheduling Parallel Jobs with CPU and I/O Resource Requirements in Cluster Computing Systems.
Proceedings of the 11th International Workshop on Modeling, 2003

An Adaptive Load Balancing Algorithm for Large Data Parallel Processing with Communication Delay.
Proceedings of the Computational Science - ICCS 2003, 2003

Parallel I/O Scheduling in Multiprogrammed Cluster Computing Systems.
Proceedings of the Computational Science - ICCS 2003, 2003

Parallel Job Scheduling on Multicluster Computing Systems.
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003

Performance Analysis of Parallel I/O Scheduling Approaches on Cluster Computing Systems.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

A Unified Resource Scheduling Approach on Cluster Computing Systems.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Job Scheduling Policy for High Throughput Computing Environments.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

2000
Time/Space Sharing Distributed Job Scheduling Policy in a Workstation Cluster Environment.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

Distributed Hierarchical Workstation Cluster Co-Ordination Scheme.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

Parallel Job Scheduling Policy for Workstation Cluster Environments.
Proceedings of the 2000 IEEE International Conference on Cluster Computing (CLUSTER 2000), November 28th, 2000

1999
An Approach to Scheduling Parallel Applications on Networks of Workstations.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1994
Framework for the design of coupled knowledge/data base medical information systems.
Proceedings of the Seventh Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'94), 1994


  Loading...